Compare NinjaOne and Trellix Endpoint Security

At a Glance
NinjaOne
NinjaOne
Star Rating
(3,704)4.7 out of 5
Market Segments
Mid-Market (49.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about NinjaOne
Trellix Endpoint Security
Trellix Endpoint Security
Star Rating
(326)4.3 out of 5
Market Segments
Enterprise (38.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Trellix Endpoint Security
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that NinjaOne excels in user-friendliness, with many users highlighting its intuitive interface and ease of installation. Reviewers appreciate the fast connection and the ability to run scripts without needing to log onto client endpoints, making daily operations smoother.
  • Users say that Trellix Endpoint Security offers robust protection against a variety of threats, including malware and ransomware. Its advanced threat detection capabilities, which utilize machine learning, are frequently praised for their effectiveness in safeguarding endpoints.
  • According to verified reviews, NinjaOne stands out for its comprehensive feature set, with users noting the continuous addition of new functionalities. This adaptability is seen as a significant advantage, allowing businesses to keep pace with evolving IT needs.
  • Reviewers mention that Trellix Endpoint Security provides strong orchestration and visibility features, which are essential for organizations looking to maintain control over their security landscape. Users appreciate the deep analysis capabilities and features like sandboxing that enhance threat management.
  • G2 reviewers highlight that NinjaOne's reporting capabilities are particularly beneficial for project management, allowing users to easily generate usage reports for meetings and client check-ins. This feature simplifies the process of creating actionable recommendations based on asset management data.
  • Users express concerns about Trellix Endpoint Security's implementation process, with some finding it less straightforward compared to NinjaOne. While Trellix offers strong security features, the setup experience may pose challenges for some organizations, impacting their overall satisfaction.
Pricing
Entry-Level Pricing
NinjaOne
No pricing available
Trellix Endpoint Security
No pricing available
Free Trial
NinjaOne
Free Trial is available
Trellix Endpoint Security
No trial information available
Ratings
Meets Requirements
9.0
3,514
8.9
279
Ease of Use
9.1
3,551
8.6
279
Ease of Setup
9.1
3,329
8.1
85
Ease of Admin
9.1
3,055
8.2
84
Quality of Support
9.1
3,373
8.5
264
Has the product been a good partner in doing business?
9.4
2,988
8.1
80
Product Direction (% positive)
9.7
3,471
8.4
273
Features by Category
IT Service Management (ITSM) ToolsHide 22 FeaturesShow 22 Features
7.9
780
Not enough data
Administration
8.2
657
Not enough data
8.7
690
Not enough data
8.2
689
Not enough data
Service Desk
8.1
684
Not enough data
7.9
655
Not enough data
7.7
634
Not enough data
Management
8.3
622
Not enough data
9.0
628
Not enough data
8.7
604
Not enough data
8.8
607
Not enough data
8.4
585
Not enough data
Functionality
7.6
620
Not enough data
8.5
613
Not enough data
8.9
644
Not enough data
8.9
660
Not enough data
Agentic AI - IT Service Management (ITSM) Tools
6.9
173
Not enough data
6.8
171
Not enough data
6.9
169
Not enough data
6.7
170
Not enough data
6.7
169
Not enough data
6.7
167
Not enough data
6.8
166
Not enough data
8.1
362
Not enough data
Compatibility
8.8
331
Not enough data
8.1
291
Not enough data
8.3
301
Not enough data
8.2
279
Not enough data
Management
Feature Not Available
Not enough data
8.3
290
Not enough data
8.6
291
Not enough data
8.8
320
Not enough data
9.2
328
Not enough data
Compliance
8.7
291
Not enough data
8.4
278
Not enough data
Feature Not Available
Not enough data
Agentic AI - Server Backup
7.3
65
Not enough data
7.2
63
Not enough data
7.6
64
Not enough data
7.4
63
Not enough data
7.2
63
Not enough data
7.4
64
Not enough data
8.1
409
Not enough data
Functionality
Feature Not Available
Not enough data
8.7
339
Not enough data
9.0
366
Not enough data
8.5
345
Not enough data
Feature Not Available
Not enough data
Compatibility
8.8
350
Not enough data
8.6
342
Not enough data
8.3
327
Not enough data
Management
8.2
327
Not enough data
8.8
330
Not enough data
8.7
331
Not enough data
Agentic AI - Online Backup
7.6
75
Not enough data
7.3
72
Not enough data
7.3
73
Not enough data
7.3
71
Not enough data
7.4
72
Not enough data
7.3
72
Not enough data
Remote Monitoring & Management (RMM)Hide 19 FeaturesShow 19 Features
8.0
2,360
Not enough data
Inventory Management - Remote Monitoring & Management (RMM)
9.3
2164
|
Verified
Not enough data
8.7
564
Not enough data
8.1
449
Not enough data
Monitoring and Management
9.3
2141
|
Verified
Not enough data
8.4
1868
Not enough data
8.7
1985
|
Verified
Not enough data
9.0
2168
|
Verified
Not enough data
8.3
475
Not enough data
IT Operations & Workflow - Remote Monitoring & Management (RMM)
8.5
469
Not enough data
Service Management
9.2
2074
|
Verified
Not enough data
8.1
451
Not enough data
7.3
484
Not enough data
Agentic AI - Remote Monitoring & Management (RMM)
7.3
480
Not enough data
7.0
462
Not enough data
7.2
464
Not enough data
6.9
453
Not enough data
6.8
453
Not enough data
6.9
454
Not enough data
7.0
450
Not enough data
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
7.9
451
Not enough data
Scope
8.7
413
Not enough data
8.8
428
Not enough data
Security
8.5
422
Not enough data
8.3
389
Not enough data
7.4
381
Not enough data
Management
8.8
411
Not enough data
8.7
409
Not enough data
8.7
398
Not enough data
8.7
400
Not enough data
7.8
371
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
7.3
168
Not enough data
7.1
167
Not enough data
7.3
167
Not enough data
7.1
164
Not enough data
7.0
164
Not enough data
7.2
166
Not enough data
7.1
167
Not enough data
7.5
729
Not enough data
Functionality
8.8
670
Not enough data
8.9
697
Not enough data
8.0
614
Not enough data
8.8
609
Not enough data
Monitoring - Network Monitoring
7.5
247
Not enough data
7.8
250
Not enough data
8.3
262
Not enough data
Management
8.2
569
Not enough data
8.2
583
Not enough data
7.6
536
Not enough data
Analytics - Network Monitoring
7.0
238
Not enough data
6.9
236
Not enough data
Security - Network Monitoring
7.7
241
Not enough data
7.2
238
Not enough data
7.1
238
Not enough data
Network Performance - Network Monitoring
6.9
239
Not enough data
7.4
243
Not enough data
AI Automation - Network Monitoring
6.4
228
Not enough data
6.3
228
Not enough data
6.4
227
Not enough data
Agentic AI - Network Monitoring
6.6
124
Not enough data
6.5
122
Not enough data
6.7
125
Not enough data
6.6
121
Not enough data
6.4
120
Not enough data
6.6
121
Not enough data
6.4
122
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
8.8
46
Administration
Not enough data
9.0
44
Not enough data
8.5
45
Not enough data
8.8
43
Not enough data
8.8
43
Not enough data
8.8
44
Functionality
Not enough data
9.0
42
Not enough data
8.8
43
Not enough data
8.8
43
Not enough data
9.1
44
Analysis
Not enough data
8.7
45
Not enough data
8.6
44
Not enough data
8.6
44
8.0
591
Not enough data
Monitoring
9.3
560
|
Verified
Not enough data
9.2
557
|
Verified
Not enough data
8.5
506
|
Verified
Not enough data
7.1
197
Not enough data
Management Tools
8.2
497
Not enough data
8.6
507
|
Verified
Not enough data
8.5
487
|
Verified
Not enough data
Generative AI
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Agentic AI - Incident Management
7.5
95
Not enough data
7.4
94
Not enough data
7.7
93
Not enough data
7.2
93
Not enough data
7.2
93
Not enough data
7.3
92
Not enough data
7.5
91
Not enough data
7.9
1,224
Not enough data
Asset Inventory
9.0
1152
Not enough data
8.8
1138
Not enough data
7.7
1019
Not enough data
Feature Not Available
Not enough data
8.2
1055
Not enough data
Generative AI
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Agentic AI - IT Asset Management
7.4
228
Not enough data
7.2
223
Not enough data
7.4
220
Not enough data
7.1
217
Not enough data
7.1
216
Not enough data
7.1
221
Not enough data
7.0
218
Not enough data
Management
9.1
1116
Not enough data
8.7
1038
Not enough data
8.1
996
Not enough data
8.2
1048
Not enough data
8.4
1,798
Not enough data
Administration
9.2
1628
Not enough data
8.7
1553
Not enough data
7.8
1416
Not enough data
9.2
1633
Not enough data
8.9
1497
Not enough data
8.8
1546
Not enough data
Maintenance
9.2
1619
Not enough data
7.7
1326
Not enough data
Communication
7.9
1396
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
7.2
1300
Not enough data
Security
8.3
1345
Not enough data
8.4
1377
Not enough data
Device Support
7.6
1352
Not enough data
8.4
1429
Not enough data
8.4
1412
Not enough data
Performance
8.2
1500
Not enough data
7.9
344
Not enough data
Functionality
8.8
324
Not enough data
7.9
291
Not enough data
8.1
296
Not enough data
8.6
313
Not enough data
Performance
8.7
317
Not enough data
8.5
302
Not enough data
Feature Not Available
Not enough data
8.6
304
Not enough data
Agentic AI - PC Backup
7.1
88
Not enough data
7.1
88
Not enough data
6.9
87
Not enough data
7.0
87
Not enough data
Not enough data
7.9
6
Generative AI
Not enough data
7.7
5
Not enough data
8.1
6
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
7.2
9
Generative AI
Feature Not Available
7.2
9
8.5
238
Not enough data
Management and Discovery - IT Documentation
8.3
221
Not enough data
8.3
219
Not enough data
8.7
221
Not enough data
Operations - IT Documentation
8.4
221
Not enough data
8.8
228
Not enough data
8.4
223
Not enough data
Autonomous Endpoint Management (AEM)Hide 7 FeaturesShow 7 Features
7.8
96
Not enough data
Generative AI - Autonomous Endpoint Management
7.0
64
Not enough data
7.2
65
Not enough data
7.1
63
Not enough data
Monitoring and Management - Autonomous Endpoint Management
8.7
92
Not enough data
8.1
72
Not enough data
7.8
67
Not enough data
8.8
83
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Device Management (MDM)Hide 18 FeaturesShow 18 Features
8.1
547
Not enough data
Platform - Mobile Device Management (MDM)
8.5
442
Not enough data
Operating System
9.2
528
Not enough data
8.1
502
Not enough data
8.3
478
Not enough data
Management
8.5
486
Not enough data
8.2
448
Not enough data
8.2
445
Not enough data
8.1
437
Not enough data
8.3
449
Not enough data
Security
8.5
457
Not enough data
8.6
465
Not enough data
Agentic AI - Mobile Device Management (MDM)
7.7
143
Not enough data
7.6
140
Not enough data
7.8
142
Not enough data
7.7
139
Not enough data
7.6
137
Not enough data
7.6
139
Not enough data
7.6
136
Not enough data
Not enough data
Not enough data
Knowledge Base
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Content
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Communication
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enterprise IT ManagementHide 18 FeaturesShow 18 Features
7.9
857
Not enough data
Analysis
8.1
727
Not enough data
Platform
7.8
699
Not enough data
9.1
785
Not enough data
8.2
680
Not enough data
8.5
737
Not enough data
8.3
707
Not enough data
Security
8.7
741
Not enough data
9.2
812
Not enough data
7.6
673
Not enough data
8.7
711
Not enough data
8.2
681
Not enough data
Agentic AI - Enterprise IT Management
7.4
163
Not enough data
7.2
153
Not enough data
7.3
156
Not enough data
7.0
152
Not enough data
7.0
151
Not enough data
6.9
151
Not enough data
7.0
150
Not enough data
Reviews
Reviewers' Company Size
NinjaOne
NinjaOne
Small-Business(50 or fewer emp.)
43.4%
Mid-Market(51-1000 emp.)
49.7%
Enterprise(> 1000 emp.)
6.9%
Trellix Endpoint Security
Trellix Endpoint Security
Small-Business(50 or fewer emp.)
22.6%
Mid-Market(51-1000 emp.)
38.6%
Enterprise(> 1000 emp.)
38.9%
Reviewers' Industry
NinjaOne
NinjaOne
Information Technology and Services
26.7%
Computer & Network Security
13.0%
Hospital & Health Care
4.0%
Manufacturing
3.7%
Computer Software
2.9%
Other
49.6%
Trellix Endpoint Security
Trellix Endpoint Security
Information Technology and Services
18.8%
Computer Software
10.0%
Financial Services
7.2%
Computer & Network Security
5.0%
Telecommunications
3.1%
Other
55.8%
Alternatives
NinjaOne
NinjaOne Alternatives
Atera
Atera
Add Atera
TeamViewer
TeamViewer
Add TeamViewer
N-able N-central
N-able N-central
Add N-able N-central
LogMeIn Resolve
LogMeIn Resolve
Add LogMeIn Resolve
Trellix Endpoint Security
Trellix Endpoint Security Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Microsoft Defender for Endpoint
Microsoft Defender for...
Add Microsoft Defender for Endpoint
Discussions
NinjaOne
NinjaOne Discussions
Do I need a WSUS Server to enable patch management on Windows devices?
6 Comments
Jenny T.
JT
You can use WSUS to completely manage the distribution of Microsoft Update updates to https://basketballstars2.com computers on your network. Read more
How do I make a script to block all users on a PC from executive .MSI / .exe files?
2 Comments
Pani R.
PR
Make them regular users. Do not make their accounts administrators.Read more
Do you provide the same level of functionality for MacOS as you do for Windows?
2 Comments
Brian A.
BA
Hey Sam, We are an all Mac firm (as we work on Macs ourselves) and I can confirm they do support Macs well. Now, because of the Apple environment, they...Read more
Trellix Endpoint Security
Trellix Endpoint Security Discussions
What is the difference between McAfee Antivirus Plus and Total Protection?
1 Comment
Randall M.
RM
The main difference between McAfee total protection and McAfee Antivirus Plus is that McAfee total protection provides complete protection to your...Read more
What is MVISION Endpoint Security used for?
1 Comment
MP
To Protect endpoints from Malwares and Viruses Read more
Monty the Mongoose crying
Trellix Endpoint Security has no more discussions with answers